Petya Ransomware: How It Works And How To Beat It
Businesses and institutions were victimized by a new and more menacing global malware attack. The perpetrators used the Petya ransomware worm to carry out the cyber attack starting on Tuesday morning.
It is now believed that the Petya ransomware was just some kind of cover for the real culprit. Underneath the Petya is a kind of malware now being dubbed by some as "NotPetya" and "Goldeneye." Petya is originally an older version of the said malware and the new one that's wreaking havoc around the globe is said to be a new strain of the malware.
The Petya cyber attack crippled companies by locking down or freezing their computers. This was done by targeting vulnerable Windows Server Message Block, a service utilized for file and printer sharing across local networks. Petya was also spread through Microsoft PsExec.
The Petya ransomware rapidly spread from Ukraine to other companies in Europe via enterprise networks. The speculation is that the ransomware spread via foreign companies with subsidiaries or operations in Ukraine. The Petya apparently traveled "upstream" via corporate VPNs to central servers and then to computers with Windows. According to Tom's Guide, there is also proof that Petya spread through infected email attachments but this has yet to be looked upon more closely.
To stop Petya from spreading, people should download the patch created to deal with this latest cyber attack. Users should also have the latest version of Microsoft Windows. Those with Windows that updates automatically are safe from the attack. CNET has a list of the links where users can download security updates necessary to stop Petya from affecting their computers and spreading further. It is also important to have an updated antivirus software and to avoid opening attachments from unknown sources. It is also vital that users keep a backup of their files especially the important ones. In the event that Petya infects their computers, they will still have access to their files.
Hackers Are Using Movie Subtitles To Access Your Computers
Hackers have found a way to insert malicious files into movie subtitles that will let them take control of computers and smart TVs.
Meet The 22-Year-Old Who Stopped The Massive WannaCry Cyberattack
Marcus Hutchins is a 22-year-old undergrad surfer and cybersecurity expert who successfully foiled a WannaCry Ransomware attack.
IBM Put Customers At Risk With Malware-Infested Flash Drives, Here’s What To Do
IBM has admitted to inadvertently shipping out USB flash drives infected with Trojan malware.
Cyber Attacks Take Down Twitter, Reddit, Spotify And Other Websites
A series of DDos attacks on Friday targeting Dyn DNS rendered numerous websites useless.
Massive Cyberattack Is Spreading Havoc Around The World, Deadlier Than WannaCry
A new cyber attack, likely deadlier than WannaCry, is locking computers worldwide with huge businesses and major institutions among those targeted.
MORE IN ITECHPOST
The Role of Technology in Education in 2019
2019 is proving to be another great year for trends in educational technology. There are many upcoming trends that seem to have a bearing on the future of the sector with respect to technology.
New Retroreflective Material Could be Used in Nighttime Color-Changing Road Signs
BUFFALO, N.Y. -- A thin film that reflects light in intriguing ways could be used to make road signs that shine brightly and change color at night, according to a study that will be published on Aug. 9 in Science Advances.
Top 5 Video Games to Play for a Truly Unique First Date
Video games have a way of taking us outside of ourselves and live in a fantasy world. It's even better when you're playing a game with someone special!